1. Alquié D.: Approximating Addition by XOR: How to Go All the Way. Tech. Rep. 072/2010, Cryptology ePrint Archive (2010). Available at http://eprint.iacr.org/2010/072 .
2. Biham E., Shamir A.: Differential cryptanalysis of FEAL and n-Hash. In: Advances in Cryptology— EUROCRYPT 1991, no. 547 in Lecture Notes in Computer Science, pp. 1–16. Springer, Berlin (1991).
3. Carlet C., Charpin P., Zinoviev V.: Codes, bent functions and permutations suitable for DES-like crypto systems. Des. Codes Cryptogr. 15(2), 125–156 (1998)
4. Holte J.: Carries, combinatorics and an amazing matrix. Am. Math. Mon. 104(2), 138–149 (1997)
5. Leurent G., Thomsen S.: Practical partial collisions on the compression function of BMW. In: Fast Software Encryption 2011, no. 6733 in Lecture Notes in Computer Science. Springer, Berlin (2011).